Login
Register
Dark Mode
Brightness
Profile
Edit Profile
Messages
My favorites
My Updates
Logout
Filter
Profile
Wall
Recent activity
All questions
All answers
Exams Taken
All Blogs
Recent activity by Vertika Srivastava
2
answers
1
RAW hazard
1.4k
views
answered
Jan 31, 2016
4
answers
2
MadeEasy Test Series: Computer Networks - Congestion Control
Q).Suppose that TCP congestion window is set to $28 \text{KB}$ and time-out occurs.The window size after the next six successful transmission bursts (Assume maximum segment size is $2 \text{KB}$ and TCP uses congestion avoidance) is _______(in KB)
Q).Suppose that TCP congestion window is set to $28 \text{KB}$ and time-out occurs.The window size after the next six successful transmission bursts (Assume maximum segme...
2.8k
views
commented
Jan 24, 2016
Computer Networks
made-easy-test-series
computer-networks
congestion-control
+
–
5
answers
3
MadeEasy Test Series: Computer Networks - Congestion Control
Initially (as slow start ) full window 12MSS cwnd = 1MSS ssthresh = 6MSS 1MSS sent after 1st RTT -> cwnd = 2 , and so on subsequent RTT -> 4 , 5 ,6, 7, 8,9,10,11,12 so 11RTT so answer should be 110ms but none of the option matches
Initially (as slow start )full window 12MSScwnd = 1MSSssthresh = 6MSS1MSS sent after 1st RTT - cwnd = 2 ,and so on subsequent RTT - 4 , 5 ,6, 7, 8,9,10,11,12so 11RTTso an...
1.6k
views
commented
Jan 24, 2016
Computer Networks
made-easy-test-series
computer-networks
congestion-control
+
–
0
answers
4
No of positive integer satisfying the inequality
e Q) The number of positive integers satisfying the inequality are ________ $^{n+1}C_{(n-2)} + ^{n+1}C_{(n-1)}\leq 90$ getting n= 1 to 9 so answer should be 9 but answer given is 8 (2 to 9)
eQ) The number of positive integers satisfying the inequality are ________ $^{n+1}C_{(n-2)} + ^{n+1}C_{(n-1)}\leq 90$getting n= 1 to 9 so answer should be 9 ...
423
views
comment edited
Jan 24, 2016
Operating System
maths
+
–
1
answer
5
MadeEasy Test Series: CO & Architecture - Cache Memory
getting 7/11
getting 7/11
377
views
asked
Jan 24, 2016
Operating System
made-easy-test-series
co-and-architecture
cache-memory
set-associative-memory
+
–
5
answers
6
TIFR CSE 2010 | Part B | Question: 26
Suppose there is a balanced binary search tree with $n$ nodes, where at each node, in addition to the key, we store the number of elements in the sub tree rooted at that node. Now, given two elements $a$ and $b$, such that $a < b$ ... $O(n)$ comparisons and $O(n)$ additions, using depth-first- search.
Suppose there is a balanced binary search tree with $n$ nodes, where at each node, in addition to the key, we store the number of elements in the sub tree rooted at that ...
8.9k
views
commented
Jan 14, 2016
DS
tifr2010
binary-search-tree
+
–
3
answers
7
GATE CSE 1994 | Question: 5
A $3-\text{ary}$ tree is a tree in which every internal node has exactly three children. Use induction to prove that the number of leaves in a $3-\text{ary}$ tree with $n$ internal nodes is $2(n+1)$.
A $3-\text{ary}$ tree is a tree in which every internal node has exactly three children. Use induction to prove that the number of leaves in a $3-\text{ary}$ tree with $n...
13.0k
views
commented
Jan 14, 2016
DS
gate1994
data-structures
tree
proof
descriptive
+
–
5
answers
8
GATE CSE 1998 | Question: 1.24
Which of the following statements is false? A tree with a $n$ nodes has $(n – 1)$ edges A labeled rooted binary tree can be uniquely constructed given its postorder and preorder traversal results. A complete binary tree with $n$ internal nodes has $(n + 1)$ leaves. The maximum number of nodes in a binary tree of height h is $2^{h+1} - 1$
Which of the following statements is false? A tree with a $n$ nodes has $(n – 1)$ edges A labeled rooted binary tree can be uniquely constructed given its postorder and...
17.1k
views
answered
Jan 14, 2016
DS
gate1998
data-structures
tree
multiple-selects
normal
+
–
11
answers
9
GATE IT 2007 | Question: 28
Consider a hash function that distributes keys uniformly. The hash table size is $20$. After hashing of how many keys will the probability that any new key hashed collides with an existing one exceed $0.5$. $5$ $6$ $7$ $10$
Consider a hash function that distributes keys uniformly. The hash table size is $20$. After hashing of how many keys will the probability that any new key hashed collide...
29.7k
views
commented
Jan 14, 2016
DS
gateit-2007
data-structures
hashing
probability
normal
+
–
3
answers
10
coa
Hit ratio of the cache memory read request is 85% and the cache memory is 5 times faster than main memory. Block size in memory organization is 4 words. The access time of the main memory is 72 ns per word. Write through protocol (simultaneous memory ... remaining for write operation. What is the average access time (in ns) of the memory when considering both read and write operations?
Hit ratio of the cache memory read request is 85% and the cache memory is 5 times faster than main memory. Block size in memory organization is 4 words. The access time o...
3.2k
views
commented
Jan 13, 2016
CO and Architecture
co-and-architecture
+
–
2
answers
11
efficiency
1.1k
views
commented
Jan 9, 2016
10
answers
12
GATE CSE 2015 Set 3 | Question: 28
Consider a network connecting two systems located $8000$ $\text{Km}$ apart. The bandwidth of the network is $500 \times 10^6$ $\text{bits}$ per second. The propagation speed of the media is $4 \times 10^6$ $\text{meters}$ per ... . Assume that processing delays at nodes are negligible. Then, the minimum size in bits of the sequence number field has to be ______.
Consider a network connecting two systems located $8000$ $\text{Km}$ apart. The bandwidth of the network is $500 \times 10^6$ $\text{bits}$ per second. The propagation sp...
14.8k
views
commented
Jan 9, 2016
Computer Networks
gatecse-2015-set3
computer-networks
sliding-window
normal
numerical-answers
+
–
3
answers
13
TIFR CSE 2012 | Part B | Question: 14
Consider the quick sort algorithm on a set of $n$ ... $\Theta (n^{2})$. None of the above.
Consider the quick sort algorithm on a set of $n$ numbers, where in every recursive subroutine of the algorithm, the algorithm chooses the median of that set as the pivot...
3.8k
views
commented
Jan 7, 2016
Algorithms
tifr2012
algorithms
sorting
quick-sort
time-complexity
+
–
1
answer
14
Unix INODE
Q.1) Consider the Unix inode with 12 Direct Disk Block Addresses(DBA), 1 single indirect DBA, 1 Doubly Indirect DBA and 1 triple indirect DBA. The DBA requires 32 bits and the Disk block size is 1KB. Then what is the maximum file size possible? Vs Q.2) ... is 8 Bytes. What is the maximum possible file size in this file system? Vs What is the Total Size of the File System for both cases?
Q.1) Consider the Unix inode with 12 Direct Disk Block Addresses(DBA), 1 single indirect DBA, 1 Doubly Indirect DBA and 1 triple indirect DBA. The DBA requires 32 bits an...
5.5k
views
commented
Jan 3, 2016
Operating System
operating-system
unix
inode
+
–
6
answers
15
GATE CSE 2006 | Question: 61
The atomic fetch-and-set $x, y$ instruction unconditionally sets the memory location $x$ to $1$ and fetches the old value of $x$ in $y$ without allowing any intervening access to the memory location $x$ ... a pair of normal load/store can be used The implementation of $V$ is wrong The code does not implement a binary semaphore
The atomic fetch-and-set $x, y$ instruction unconditionally sets the memory location $x$ to $1$ and fetches the old value of $x$ in $y$ without allowing any intervening a...
27.9k
views
commented
Jan 3, 2016
Operating System
gatecse-2006
operating-system
process-synchronization
normal
+
–
2
answers
16
TIFR CSE 2011 | Part B | Question: 28
Consider a basic block: x:= a[i]; a[j]:= y; z:= a[j] optimized by removing common sub expression a[i] as follows: x:= a[i]; z:= x; a[j]:= y. Which of the following is true? Both are equivalent. The values computed ... same values only if $i$ is not equal to $j$. They will be equivalent in concurrent programming languages with shared memory. None of the above.
Consider a basic block:x:= a[i]; a[j]:= y; z:= a[j]optimized by removing common sub expression a[i] as follows:x:= a[i]; z:= x; a[j]:= y.Which of the following is true?Bo...
1.6k
views
answered
Jan 2, 2016
Operating System
tifr2011
process-synchronization
operating-system
normal
+
–
3
answers
17
GATE CSE 1994 | Question: 27
Draw a precedence graph for the following sequential code. The statements are numbered from $S_1$ to $S_6$ $S_1$ read n $S_2$ i := 1 $S_3$ if i > n next $S_4$ a(i) := i+1 $S_5$ i := i+1 $S_6$ next : write a(i) Can this graph be converted to a concurrent program using parbegin-parend construct only?
Draw a precedence graph for the following sequential code. The statements are numbered from $S_1$ to $S_6$$S_1$read n$S_2$i := 1$S_3$if i n next$S_4$a(i) := i+1$S_5$i :=...
6.1k
views
commented
Jan 2, 2016
Operating System
gate1994
operating-system
process-synchronization
normal
descriptive
+
–
6
answers
18
GATE CSE 1991 | Question: 12-a
Suppose a database consist of the following relations: SUPPLIER (SCODE,SNAME,CITY). PART (PCODE,PNAME,PDESC,CITY). PROJECTS (PRCODE,PRNAME,PRCITY). SPPR (SCODE,PCODE,PRCODE,QTY). Write SQL programs corresponding to the following queries: Print PCODE values for ... part to a project in the second city, but do not print the triples in which the two CITY values are same.
Suppose a database consist of the following relations:SUPPLIER (SCODE,SNAME,CITY). PART (PCODE,PNAME,PDESC,CITY). PROJECTS (PRCODE,PRNAME,PRCITY). SPPR (SCODE,PCODE,PRCOD...
3.4k
views
commented
Dec 29, 2015
Databases
gate1991
databases
sql
normal
descriptive
+
–
5
answers
19
GATE CSE 1997 | Question: 19
A $B^+$ - tree of order $d$ is a tree in which each internal node has between $d$ and $2 d$ key values. An internal node with $M$ key values has $M + 1$ children. The root (if it is an internal node) has between $1$ and $2d$ key values. The distance ... $4$ with $52$ leaves? What is the minimum number of leaves in a $B^+$-tree of order $d$ and height $h(h\geq 1)$?
A $B^+$ - tree of order $d$ is a tree in which each internal node has between $d$ and $2 d$ key values. An internal node with $M$ key values has $M + 1$ children. The roo...
15.1k
views
answered
Dec 28, 2015
Databases
gate1997
databases
b-tree
normal
descriptive
+
–
5
answers
20
GATE CSE 1994 | Question: 14b
For a $B^+$ - tree of order $d$ with $n$ leaf nodes, the number of nodes accessed during a search is $O(\_)$.
For a $B^+$ - tree of order $d$ with $n$ leaf nodes, the number of nodes accessed during a search is $O(\_)$.
3.6k
views
answered
Dec 28, 2015
Databases
gate1994
databases
b-tree
normal
descriptive
+
–
2
answers
21
GATE CSE 1999 | Question: 21
Consider a B-tree with degree $m$, that is, the number of children, $c$, of any internal node (except the root) is such that $m \leq c \leq 2m-1$. Derive the maximum and minimum number of records in the leaf nodes for such a B-tree with height $h, h \geq 1. ($Assume that the root of a tree is at height $0).$
Consider a B-tree with degree $m$, that is, the number of children, $c$, of any internal node (except the root) is such that $m \leq c \leq 2m-1$. Derive the maximum and ...
8.1k
views
answered
Dec 28, 2015
Databases
gate1999
databases
b-tree
normal
descriptive
+
–
10
answers
22
GATE CSE 2009 | Question: 28
Consider a $4$ stage pipeline processor. The number of cycles needed by the four instructions $I1, I2, I3, I4$ in stages $S1, S2, S3, S4$ ... the number of cycles needed to execute the following loop? For (i=1 to 2) {I1; I2; I3; I4;} $16$ $23$ $28$ $30$
Consider a $4$ stage pipeline processor. The number of cycles needed by the four instructions $I1, I2, I3, I4$ in stages $S1, S2, S3, S4$ is shown below:$$\begin{array}{|...
35.2k
views
commented
Oct 17, 2015
CO and Architecture
gatecse-2009
co-and-architecture
pipelining
normal
+
–
Email or Username
Show
Hide
Password
I forgot my password
Remember
Log in
Register